{"id":3181,"date":"2014-02-06T14:41:34","date_gmt":"2014-02-06T19:41:34","guid":{"rendered":"http:\/\/www.opensource.im\/?p=3181"},"modified":"2014-02-06T14:41:34","modified_gmt":"2014-02-06T19:41:34","slug":"encryption-university-of-illinois-at-urbana-champaign","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/encryption-university-of-illinois-at-urbana-champaign.php","title":{"rendered":"Encryption &#8211; University of Illinois at Urbana\u2013Champaign"},"content":{"rendered":"<p><p>ENCRYPTION    <\/p>\n<\/p>\n<p>    \"If privacy is outlawed, only outlaws will have    privacy. Intelligence agencies have access to good    cryptographic technology. So do the big arms and drug    traffickers. So do defense contractors, oil companies, and    other corporate giants. But ordinary people and grassroots    political organizations mostly have not had access to    affordable military grade public-key cryptographic technology.    Until now.  <\/p>\n<p>    PGP empowers people to take their privacy into their    own hands. There's a growing social need for it. That's why I    wrote it.\",  <\/p>\n<p>    Phillip Zimmermann, author of encryption software    program, PGP [1]  <\/p>\n<\/p>\n<p>    Introduction  <\/p>\n<p>    Maintaining privacy in our personal communications is    something everyone desires. Encryption is a means to achieve    that privacy. It was invented for that very purpose. That makes    encryption a good idea, right? But encryption, like most    things, can be used for good or evil. And the debate over how    to harness this powerful tool rages on as people on both sides    see that there are no easy answers. .  <\/p>\n<p>    What is encryption?  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original post:<br \/>\n<a target=\"_blank\" href=\"http:\/\/education.illinois.edu\/wp\/privacy\/encrypt.html\" title=\"Encryption - University of Illinois at Urbana\u2013Champaign\">Encryption - University of Illinois at Urbana\u2013Champaign<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> ENCRYPTION \"If privacy is outlawed, only outlaws will have privacy. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-3181","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3181"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=3181"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/3181\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=3181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=3181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=3181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}